VARIoT IoT vulnerabilities database
VAR-202410-1675 | CVE-2024-47005 | Sharp and Toshiba Tec multifunction printers ( MFP ) multiple vulnerabilities in |
CVSS V2: - CVSS V3: 8.1 Severity: HIGH |
Sharp and Toshiba Tec MFPs provide configuration related APIs. They are expected to be called by administrative users only, but insufficiently restricted.
A non-administrative user may execute some configuration APIs. Potential impacts vary depending on the vulnerability, but may include the following: * Crafted HTTP Processing the request causes the product to hang (( CVE-2024-42420 , CVE-2024-43424 , CVE-2024-45829 ) * Crafted HTTP Processing the request allows access to files inside the product (( CVE-2024-45842 ) * Settings registered by a user without administrator privileges API is used (( CVE-2024-47005 ) * Of the product Web The page authentication mechanism is bypassed. (( CVE-2024-47406 ) * A crafted image showing the product URL If you access Web Arbitrary script execution on the browser (( CVE-2024-47549 , CVE-2024-47801 ) * By inputting specially crafted input into the product by a user with administrator privileges, arbitrary scripts can be executed on the web browser of other users who access the product. (( CVE-2024-48870 )
VAR-202410-1673 | CVE-2024-45842 | Sharp and Toshiba Tec multifunction printers ( MFP ) multiple vulnerabilities in |
CVSS V2: - CVSS V3: 5.3 Severity: MEDIUM |
Sharp and Toshiba Tec MFPs improperly process URI data in HTTP PUT requests resulting in a path Traversal vulnerability.
Unintended internal files may be retrieved when processing crafted HTTP requests. Potential impacts vary depending on the vulnerability, but may include the following: * Crafted HTTP Processing the request causes the product to hang (( CVE-2024-42420 , CVE-2024-43424 , CVE-2024-45829 ) * Crafted HTTP Processing the request allows access to files inside the product (( CVE-2024-45842 ) * Settings registered by a user without administrator privileges API is used (( CVE-2024-47005 ) * Of the product Web The page authentication mechanism is bypassed. (( CVE-2024-47406 ) * A crafted image showing the product URL If you access Web Arbitrary script execution on the browser (( CVE-2024-47549 , CVE-2024-47801 ) * By inputting specially crafted input into the product by a user with administrator privileges, arbitrary scripts can be executed on the web browser of other users who access the product. (( CVE-2024-48870 )
VAR-202410-1677 | CVE-2024-45829 | Sharp and Toshiba Tec multifunction printers ( MFP ) multiple vulnerabilities in |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
Sharp and Toshiba Tec MFPs provide the web page to download data, where query parameters in HTTP requests are improperly processed and resulting in an Out-of-bounds Read vulnerability.
Crafted HTTP requests may cause affected products crashed. Potential impacts vary depending on the vulnerability, but may include the following: * Crafted HTTP Processing the request causes the product to hang (( CVE-2024-42420 , CVE-2024-43424 , CVE-2024-45829 ) * Crafted HTTP Processing the request allows access to files inside the product (( CVE-2024-45842 ) * Settings registered by a user without administrator privileges API is used (( CVE-2024-47005 ) * Of the product Web The page authentication mechanism is bypassed. (( CVE-2024-47406 ) * A crafted image showing the product URL If you access Web Arbitrary script execution on the browser (( CVE-2024-47549 , CVE-2024-47801 ) * By inputting specially crafted input into the product by a user with administrator privileges, arbitrary scripts can be executed on the web browser of other users who access the product. (( CVE-2024-48870 )
VAR-202410-1674 | CVE-2024-43424 | Sharp and Toshiba Tec multifunction printers ( MFP ) multiple vulnerabilities in |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
Sharp and Toshiba Tec MFPs improperly process HTTP request headers, resulting in an Out-of-bounds Read vulnerability.
Crafted HTTP requests may cause affected products crashed. Potential impacts vary depending on the vulnerability, but may include the following: * Crafted HTTP Processing the request causes the product to hang (( CVE-2024-42420 , CVE-2024-43424 , CVE-2024-45829 ) * Crafted HTTP Processing the request allows access to files inside the product (( CVE-2024-45842 ) * Settings registered by a user without administrator privileges API is used (( CVE-2024-47005 ) * Of the product Web The page authentication mechanism is bypassed. (( CVE-2024-47406 ) * A crafted image showing the product URL If you access Web Arbitrary script execution on the browser (( CVE-2024-47549 , CVE-2024-47801 ) * By inputting specially crafted input into the product by a user with administrator privileges, arbitrary scripts can be executed on the web browser of other users who access the product. (( CVE-2024-48870 )
VAR-202410-1679 | CVE-2024-42420 | Sharp and Toshiba Tec multifunction printers ( MFP ) multiple vulnerabilities in |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
Sharp and Toshiba Tec MFPs contain multiple Out-of-bounds Read vulnerabilities, due to improper processing of keyword search input and improper processing of SOAP messages.
Crafted HTTP requests may cause affected products crashed. Potential impacts vary depending on the vulnerability, but may include the following: * Crafted HTTP Processing the request causes the product to hang (( CVE-2024-42420 , CVE-2024-43424 , CVE-2024-45829 ) * Crafted HTTP Processing the request allows access to files inside the product (( CVE-2024-45842 ) * Settings registered by a user without administrator privileges API is used (( CVE-2024-47005 ) * Of the product Web The page authentication mechanism is bypassed. (( CVE-2024-47406 ) * A crafted image showing the product URL If you access Web Arbitrary script execution on the browser (( CVE-2024-47549 , CVE-2024-47801 ) * By inputting specially crafted input into the product by a user with administrator privileges, arbitrary scripts can be executed on the web browser of other users who access the product. (( CVE-2024-48870 )
VAR-202410-1698 | CVE-2024-10351 | Shenzhen Tenda Technology Co.,Ltd. of rx9 pro Out-of-bounds write vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability was found in Tenda RX9 Pro 22.03.02.20. It has been rated as critical. This issue affects the function sub_424CE0 of the file /goform/setMacFilterCfg of the component POST Request Handler. The manipulation of the argument deviceList leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Shenzhen Tenda Technology Co.,Ltd. of rx9 pro An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda RX9 Pro is a high-performance wireless router that provides stable and fast network connection services. Remote attackers can exploit this vulnerability to launch attacks and potentially execute arbitrary code
VAR-202410-2302 | CVE-2024-48441 | Tianyu CPE Router CommonCPExCPETS Command Execution Vulnerability |
CVSS V2: 10.0 CVSS V3: 8.8 Severity: HIGH |
Wuhan Tianyu Information Industry Co., Ltd Tianyu CPE Router CommonCPExCPETS_v3.2.468.11.04_P4 was discovered to contain a command injection vulnerability via the component at_command.asp. Tianyu CPE Router is a wireless router from China's Tianyu company
VAR-202410-1497 | CVE-2024-10280 | plural Shenzhen Tenda Technology Co.,Ltd. In the product NULL Pointer dereference vulnerability |
CVSS V2: 6.8 CVSS V3: 6.5 Severity: High |
A vulnerability was found in Tenda AC6, AC7, AC8, AC9, AC10, AC10U, AC15, AC18, AC500 and AC1206 up to 20241022. It has been rated as problematic. This issue affects the function websReadEvent of the file /goform/GetIPTV. The manipulation of the argument Content-Length leads to null pointer dereference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. AC15 firmware, AC7 firmware, ac10u firmware etc. The product has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state
VAR-202410-3534 | CVE-2023-50310 | IBM of Multiplatforms for IBM CICS Transaction Gateway Vulnerability regarding insufficient protection of authentication information in |
CVSS V2: 6.8 CVSS V3: 7.5 Severity: HIGH |
IBM CICS Transaction Gateway for Multiplatforms 9.2 and 9.3 transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. IBM of Multiplatforms for IBM CICS Transaction Gateway There are vulnerabilities in inadequate protection of credentials.Information may be obtained
VAR-202410-1759 | CVE-2024-49215 | Sangoma of Asterisk and certified asterisk Past traversal vulnerability in |
CVSS V2: - CVSS V3: 7.8 Severity: High |
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-49294. Reason: This candidate is a reservation duplicate of CVE-2023-49294. Notes: All CVE users should reference CVE-2023-49294 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. Sangoma of Asterisk and certified asterisk Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202410-3655 | No CVE | Hewlett Packard Enterprise MSR954 has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
MSR954 is usually used in medium and large enterprise environments and supports a variety of network services and functions, including advanced routing, VPN, network security, etc.
Hewlett Packard Enterprise MSR954 has a weak password vulnerability, which can be exploited by attackers to log in to the backend and obtain sensitive information.
VAR-202410-1737 | CVE-2024-48016 | Dell's secure connect gateway Vulnerability in using cryptographic algorithms in |
CVSS V2: 4.6 CVSS V3: 4.6 Severity: MEDIUM |
Dell Secure Connect Gateway (SCG) 5.0 Appliance - SRS, version(s) 5.24, contains a Use of a Broken or Risky Cryptographic Algorithm vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to information disclosure. The attacker may be able to use exposed credentials to access the system with privileges of the compromised account. (DoS) It may be in a state. Dell Secure Connect Gateway (Dell SCG) is a secure connection gateway of Dell (Dell) in the United States. The vulnerability is caused by the use of damaged or risky encryption algorithms
VAR-202410-1656 | CVE-2024-47241 | Dell's secure connect gateway Certificate validation vulnerabilities in |
CVSS V2: 6.5 CVSS V3: 5.5 Severity: MEDIUM |
Dell Secure Connect Gateway (SCG) 5.0 Appliance - SRS, version(s) 5.24, contains an Improper Certificate Validation vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to unauthorized access and modification of transmitted data. The vulnerability is caused by an incorrect certificate verification vulnerability
VAR-202410-1985 | CVE-2024-47240 | Dell's secure connect gateway Vulnerability regarding improper default permissions in |
CVSS V2: - CVSS V3: 6.3 Severity: MEDIUM |
Dell Secure Connect Gateway (SCG) 5.24 contains an Incorrect Default Permissions vulnerability. A local attacker with low privileges can access the file system and could potentially exploit this vulnerability to gain write access to unauthorized data and cause a version update failure condition. (DoS) It may be in a state
VAR-202410-3668 | No CVE | Shenzhen Inovance Technology Co., Ltd. AM401-CPU1608TP has a denial of service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
AM401-CPU1608TP is an economical medium-sized PLC developed by Suzhou Inovance Technology Co., Ltd., which supports Ethernet communication.
AM401-CPU1608TP of Shenzhen Inovance Technology Co., Ltd. has a denial of service vulnerability. Attackers can exploit this vulnerability to cause a denial of service at the PLC application layer, and the PLC needs to be manually restarted to return to normal.
VAR-202410-3649 | No CVE | ARRIS VAP3402E has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
ARRIS VAP3402E is a wireless access device product.
ARRIS VAP3402E has a weak password vulnerability, which can be exploited by attackers to log in to the backend and obtain sensitive information.
VAR-202410-1736 | CVE-2024-48638 | D-Link DIR-878 and D-Link DIR-882 Command Injection Vulnerability (CNVD-2024-41693) |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the SubnetMask parameter in the SetGuestZoneRouterSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request. D-Link DIR-878 is a wireless router. D-Link DIR-882 is a dual-band wireless router
VAR-202410-1779 | CVE-2024-48637 | D-Link DIR-878 and D-Link DIR-882 Command Injection Vulnerability (CNVD-2024-41694) |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the VLANID:1/VID parameter in the SetVLANSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request. D-Link DIR-878 is a wireless router. D-Link DIR-882 is a dual-band wireless router
VAR-202410-1655 | CVE-2024-48636 | D-Link DIR-878 and D-Link DIR-882 Command Injection Vulnerability (CNVD-2024-41695) |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the VLANID:0/VID parameter in the SetVLANSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request. D-Link DIR-878 is a wireless router. D-Link DIR-882 is a dual-band wireless router
VAR-202410-1831 | CVE-2024-48635 | D-Link DIR-878 and D-Link DIR-882 Command Injection Vulnerability (CNVD-2024-41696) |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the VLANID:2/VID parameter in the SetVLANSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request. D-Link DIR-878 is a wireless router. D-Link DIR-882 is a dual-band wireless router